نتایج جستجو برای: image encryption
تعداد نتایج: 400416 فیلتر نتایج به سال:
Security in transmission of digital images has its importance in today’s image communications, due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been investigat...
Quantum computation has achieved a tremendous success during the last decades. In this paper, we investigate the potential application of a famous quantum computation model, i.e., quantum walks (QW) in image encryption. It is found that QW can serve as an excellent key generator thanks to its inherent nonlinear chaotic dynamic behavior. Furthermore, we construct a novel QW-based image encryptio...
A new image encryption scheme based on logistic map and discrete fractional angular transform has been proposed. In the proposed scheme, the original image is encrypted with the random sequence generated by the logistic map, and the encrypted image is subsequently processed by the discrete fractional angular transform, which produces the ciphertext after double encryptions. The parameters of th...
In the present world when whole web is now coming on from text data to multimedia data, one of the major security concerns is the protection of this multimedia data. Image, which covers the highest percentage of the multimedia data, its protection is very important. This can be achieved by Image encryption. There are so many different techniques should be used to protect confidential image data...
The science of cryptography has recently attracted significant attention, as progressively more information is stored and transmitted in electronic form. Cryptography is the discipline of using codes to encrypt data into an unreadable format that only the targeted recipients can decrypt and read. Encryption methods can be divided into two categories: lossy and lossless. In lossy encryption meth...
An image encryption scheme based on high-dimensional dynamical multiple chaotic maps are proposed in this paper. In order to produce fast encryption and more avalanche effect, the circular shift algorithm is utilized to permute the positions of the image pixels in the spatial domain. The experimental results show that it is more efficient than traditional encryption schemes and it provides an s...
This paper aims at improving the level of security and secrecy provided by the digital color signal-based image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. This new proposed encryption algorithm can ensure the lossless of transmissions of images. The p...
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryp...
Mobile WiMax security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption technique does not guarantee a powerful secure end-to-end image transmission, and, consequently, WiMax presents a range of security design and integration challenges. In this paper, two proposed chaos en...
Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been an important means of expressing information of person. There are many encryption algorithm had been available each one having some strength and weakness. Image cryptography can ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید